<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-19T18:29:45.796850+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/1755ddf7-92ad-44e8-8699-5af580688594/export</id>
    <title>1755ddf7-92ad-44e8-8699-5af580688594</title>
    <updated>2026-05-19T18:29:46.164526+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1755ddf7-92ad-44e8-8699-5af580688594", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-49912", "type": "seen", "source": "https://t.me/cvedetector/24250", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-49912 - Linux Btrfs Ulist Leak\", \n  \"Content\": \"CVE ID : CVE-2022-49912 \nPublished : May 1, 2025, 3:16 p.m. | 1\u00a0hour, 9\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nbtrfs: fix ulist leaks in error paths of qgroup self tests  \n  \nIn the test_no_shared_qgroup() and test_multiple_refs() qgroup self tests,  \nif we fail to add the tree ref, remove the extent item or remove the  \nextent ref, we are returning from the test function without freeing the  \n\"old_roots\" ulist that was allocated by the previous calls to  \nbtrfs_find_all_roots(). Fix that by calling ulist_free() before returning. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-01T19:01:43.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/1755ddf7-92ad-44e8-8699-5af580688594/export"/>
    <published>2025-05-01T19:01:43+00:00</published>
  </entry>
</feed>
